General
-
Target
invoice.pdf.exe
-
Size
291KB
-
Sample
200713-l1kyx2xw9x
-
MD5
06c5295adf8e75f15e92282074f3109a
-
SHA1
1f85e23fd58e8438c0de85829da909d7b4be3dcc
-
SHA256
6a9263966518a0954d30630177c32a28fa2dc297e154cc453d964034374b1009
-
SHA512
11de33b485b90f1092991fdb011fdfa70a225f1ae525e6af72a09ccde21897a5f8469bc530b6a9e47b6c0a2c7beeb9b47dbbb01f81de8f4b2f330d17b04af1aa
Static task
static1
Behavioral task
behavioral1
Sample
invoice.pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
invoice.pdf.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chibuikelightwork1
Targets
-
-
Target
invoice.pdf.exe
-
Size
291KB
-
MD5
06c5295adf8e75f15e92282074f3109a
-
SHA1
1f85e23fd58e8438c0de85829da909d7b4be3dcc
-
SHA256
6a9263966518a0954d30630177c32a28fa2dc297e154cc453d964034374b1009
-
SHA512
11de33b485b90f1092991fdb011fdfa70a225f1ae525e6af72a09ccde21897a5f8469bc530b6a9e47b6c0a2c7beeb9b47dbbb01f81de8f4b2f330d17b04af1aa
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-